Cryptographic Accumulators for Authenticated Hash Tables

  • Papamanthou C
  • Tamassia R
  • Triandopoulos N
N/ACitations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores $n$ elements in a hash table that is outsourced at a remote server. Authenticating the hash table functionality, i.e., verifying the correctness of queries answered by the server and ensuring the integrity of the stored data, is crucial because the server, lying outside the administrative control of the client, can be malicious. We design efficient and secure protocols for optimally authenticating (non-)membership queries on hash tables, using cryptographic accumulators as our basic security primitive and applying them in a novel hierarchical way over the stored data. We provide the first construction for authenticating a hash table with \emph{constant query} cost and \emph{sublinear update} cost, strictly improving upon previous methods. Our first solution, based on the RSA accumulator, allows the server to provide a proof of integrity of the answer to a membership query in \emph{constant} time and supports updates in $O\left(n^{\epsilon}\log n\right)$ time for any fixed constant $0

Cite

CITATION STYLE

APA

Papamanthou, C., Tamassia, R., & Triandopoulos, N. (2009). Cryptographic Accumulators for Authenticated Hash Tables. In CCS. Retrieved from http://eprint.iacr.org/2009/625

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free